Web Application Firewall (WAF) is the firewall which filter, Monitor and blocks the HTTP traffic to and from the web application. WAF is different from the system regular firewall because regular firewall provides the safety gates between the server while the WAF filter the content of the web application. It protect the web application by […]
Author Archive for: AWDHPL
This author has yet to write their bio.Meanwhile lets just say that we are proud admin contributed a whooping 113 entries.
Entries by admin
1. Google Chrome Today, Google Chrome has become the most used web browsers in the world. Google Chrome was released in the year 2008 as a freeware that was written in C++. The browser is known for its performance, ease of use, syncing with Google database, security, great support for WebKit, HTML5, CSS3, and other […]
1. Filezilla FileZilla is a multi-platform FTP Client that is available for Windows, Mac OS X and GNU/Linux. It offers support for FTP, FTPS and SFTP and IPv6 as well.
A web server is a computer system that processes requests via HTTP, the basic network protocol used to distribute information on the World Wide Web. The web server may be a entire system or may a software that serves the http requests.
SSH is a program for logging into a remote machine and for executing commands on a remote machine. It provide secure encrypted communications between two untrusted hosts over an insecure network. It connects and logs into the specified hostname.
It stands for file transfer protocol. It is supported by all the systems and browsers. It is a client-server protocol. This server is used to send files over to network. This is the widely used server used in the world for transfering files to the server.
Permission Groups There are three user based permission groups for each file and directory:- Owner(u) – The owner permissions apply only the owner of the file and directory. Group(g) – The group permissions apply only to the group that has been assigned to the file and directory. All users(o) – The all user permissions apply […]
To add a user in linux:- # useradd <user-name> This command is used to add a user in linux. A root user is the superuser in the linux. So a root user only have the right to add another user. Another user can only add a user if the root user give access to do […]
1) touch <filename> This command is used to create a file in linux. 2) cat <filename> This command is used to open a file in linux.
Now a days lots and lots of data is generated and with the use of android phones the life of people is easier. They now can easily connect to internet these days. With the use of android phones, for each and every use apps are created and to download the apps mobile data is being […]
The Wireless Charging (also known as Inductive Charging) is now-a-days a new trending technology. Many companies are offering wireless gadgets which offer good performance. The Wireless Charging uses electromagnetic to safely transfer power from transmitting host to the recieving device for the purpose of charging a battery. Wireless charging is based on the principle of […]
Linux is the most powerful and popular OS in the world. It is a open source source software. The code used to create linux is free and also available to view, edit and especially for the users who have appropriate skills can contribute to it. It is widely used in the IT industry these days. […]
It defines a group of one or more worker processes, configured with common settings that serve requests applications that are assigned to that application pool. It allow a set of Web applications to share one or more similarly configured worker processes and provide a convenient way to isolate a set of Web applications from other […]
As you may have read in the media recently, a new zero-day security vulnerability for a common component in the Linux operating system has been released into the wild. This vulnerability allows attackers to remotely access some vulnerable Linux-based systems without the use of compromised passwords or other user credentials. Once in the system, attackers […]
I want restore database through putty commands 1) create database 2) cd /folderlocation where database is 3) mysql-u database_username -ppassword –database=databasename < dbbackup.sql
In order to change the max upload size, you’ll have to edit a file in your server. The file is named ‘php.ini’ but it can be located in different paths, depending on the operating system and the web server installed. To get information about where your php.ini file(s) are, you can simply create a php […]
Warning: Header may not contain more than a single header, new line detected in /home/xxxx/public_html/wp-login.php on line 398.
zPanel is a free file control panel for managing files & performing actions on your server. In simple words, it is the most desirable free alternative of cPanel which has almost all features that cPanel has. I am installing the latest version of zPanel (10.1.1) on my centos 6.5 VPS server.
SyncToy 2.1 is a free application that synchronizes files and folders between locations. Typical uses include sharing files, such as photos, with other computers and creating backup copies of files and folders.
Microsoft provides integration services for Centos/RHEL on Hyper-V. After installing Centos 6 on Hyper-V, the network driver and integration services are missing. You must download and install these manually.
One of the most important settings to configure for your Business email service is the DNS. Without the correct DNS settings associated to your domain, you will experience problems receiving email.
Setting Up Your POP or IMAP Email Address in Client / Desktop Email Program. Business Email server settings are valid for every email client application that supports the POP3 or IMAP no matter the platform (Windows, Mac, iOS, Android, etc).
How to Create and Remove Email account in cpanel. Log into your cPanel and click on the Email Accounts icon.
An online forum can be considered as the first social networking site available on the internet. In an online forum, you can discuss anything and everything under the sun. You can respond and share their knowledge and opinion, and even build a virtual community. The best vBulletin hosting for a perfect forum! People can also seek […]
Linux Malware Detect (LMD) is a malware scanner for Linux released under the GNU GPLv2 (free, open source) license, that is designed around the threats faced in shared hosted environments. It uses threat data from network edge intrusion detection systems to extract malware that is actively being used in attacks and generates signatures for detection. […]
Web Hosting & Services
- Which hosting is better for me Reseller or Shared?April 21, 2018 - 7:26 am
Best and cheap shared cPanel hosting India, If you want to host your site or sites in single panel no need every website independent web hosting control panel then you need to choose shared cPanel Web Hosting. In an easy way, Shared Website Hosting Accounts are specially designed for one website owner and default to […]
- Domain registration in Jaipur
- Cheap SEO company in Kota
- Cheap hosting provider company in Ajmer
- Dedicated server provider in Udaipur
- IT services provider in Sikar
- Best website designing company in Jodhpur
- Web development company in Jaisalmer
- Top linux hosting company in Bikaner
- Top web designing company in Ganganagar
- VPS provider company in Nagaur